Risk assessment helps organizations identify, reduce and manage risks to prevent their re-occurrence. To do this, they need to spend a large amount of their IT budget on technologies and processes to find and assess those risks, determine their impact and spend considerable effort to fix them.

Additionally, the increased reliance on third-party vendors to provide risk ratings, vulnerability scans and internet surface scans produces a significant amount of fear, uncertainty and doubt about the organization’s security posture. Trying to assess actual risks against all of that noise requires a new way of thinking about risk, how to address those risks and how to engage in proactive risk management going forward.

What is a Risk Assessment?

C-suite executives need to answer a set of questions about how much to spend on removing, preventing and reducing risks and how to do this intelligently. Note that risk is usually defined as a function of the probability of a (negative) event times the magnitude (cost) of its occurrence. Ask:

  • How can risk appetite be adjusted, given the increasing number of threats?
  • How should we allocate our energies and resources to address these threats?
  • What should we spend our limited IT risk or cybersecurity budget on?
  • What are the cost/benefit trade-offs of our security spending?
  • Where will we get the biggest risk reduction value for the dollars spent?

Quantitative Risk Assessment Opens Doors for Security

Cyber risk quantification provides a data-based means to better decision-making. Risk quantification, a proven approach used in managing credit risk, market risk and operational risk, is now being applied to IT and cybersecurity risk. It provides decision-makers with the ability to understanding the likelihood of an event occurring (as well as the potential frequency), the value of assets that are at risk and the cost of the potential impact. Additionally, risk quantification can provide decision-makers with the ability to compare the value and impact of various mitigation strategies by providing a comparison of costs and expected risk reduction.

Different Approaches to Risk Management

Let’s look at several typical approaches to IT risk management.

A popular approach for conducting a risk assessment is to determine whether the organization has the proper controls in place to manage risk. This requires conducting an assessment against industry standards such as the International Organization for Standardization’s ISO/IEC 27002:2013, the National Institute of Standards and Technology’s Cybersecurity Framework, the Unified Compliance Framework or the Cloud Security Alliance’s Security Guidance.

In many cases, the prompt for this type of assessment is a regulatory requirement, internal audit or compliance program. Performing a control assessment is often part of a strong security and compliance governance program. However, determining whether the right controls are in place is addressing only one dimension of the problem. It doesn’t necessarily identify top risks or the material impact of those risks. It is critical that organizations, particularly those in regulated industries, identify whether they have control gaps. These are key to understanding whether those controls are effective. Are they actually preventing or mitigating risks?  Do they identify how much risk there is or how to reduce that risk?

Is a Maturity Assessment Right for You?

Another popular risk assessment approach is to examine the overall maturity of a cybersecurity or IT risk program. Maturity assessments are popular because they are an effective way to benchmark an organization against industry peers and the desired state of operations. The Capability Maturity Model Integration methodology has been adopted by many companies across multiple industries. Organizations are realizing that while they may have controls in place, they have questions about their effectiveness, whether their team has the needed skills and knowledge and whether they are leveraging technology and automation in an optimal way. Do they have institutional practices and the ability to leverage data to make fact-based decisions? Are the processes running in an efficient and standardized manner?

Maturity assessments can address these questions. However, they are limited because they produce a qualitative and subjective analysis. While they are a good step forward and allow organizations to reflect on areas for improvement, they do not enable prioritization of improvements based on fact-based decision criteria. These types of assessments do not provide decision-makers with an appreciation of how much risk exposure they currently have. Additionally, they fall short in answering whether organizations have the right level and appropriate allocation of spending. Organizations still need to address the question of whether their cybersecurity spending is actually reducing risk exposures and expected loss.

Quantitative Approach to Risk Management

To address that question, move to a more quantitative approach to identify and reduce risks. These approaches use advanced threat intelligence technologies, collaborative services and vulnerability analysis to identify top risks. To better understand risk exposure and expected loss, companies need to understand their threats. From there, the security team understands threat actors better, and organizations can better assess their capabilities, asset targets and potential impacts.

Once organizations align on their top risk exposures, they are able to address the second challenge associated with risks. What is the material impact if the risk should be realized? Note the definition of risk discussed before. Risk management is about reducing uncertainty surrounding the loss or negative impact of an event. To manage risks, business leaders need to understand how much risk they have, the likelihood of the event and the impact if the risk were to arise.

To better reduce uncertainty, adopt a quantitative approach to risk management. One such approach is based on the Factor Analysis of Information Risk model. This approach addresses the two key components of risk: the probable frequency and probable magnitude. By quantifying the risk, you can make fact-based decisions using cost/benefit analysis about which investments provide the best security return on investment (reduction of risks). In a time of increasing threats, increasing noise about threats and reduced budgets, adopting a risk quantification assessment approach is quickly becoming the preferred approach to managing risk.

Source: The FAIR Institute

By adopting a quantitative risk-based approach, organizations are better equipped to focus their investments, address critical skill gaps, assess the effectiveness of their control frameworks and provide a business justification for their security spending. This method results in actual risk reduction and focuses investments on the top problems. By quantifying the risks, teams can understand the actual costs of exposures and the expected loss if those risks come to pass. More fundamentally, chief information security officers and chief information officers can use these data points. They can provide their board members and executive risk committee members with the following data-based answers:

  • We know our top risks and have quantified them.
  • We understand the degree of uncertainty with respect to a threat coming to pass.
  • We have a basic idea of the material impact if the risk event occurs.
  • We know the expected loss, given the current residual risk.
  • We can predict the likelihood of an event occurring.
  • We can provide a data-based business justification for managing those risks.

Security: A Business Problem and a Technical Problem

Cybersecurity is no longer simply a technical issue; it is a business issue. The more organizations can address security risks and challenges in a quantitative manner, the more they will be able to incorporate a broader set of key stakeholders in reducing risks. Organizations can now align their risk thresholds with an understanding of their actual risks and the impact of those risks. After all, the goal of risk management is to make better decisions under conditions of uncertainty to reduce risks.

Learn how IBM Security is empowering better business decisions with its Security Risk Quantification Services, helping organizations apply the same analytics used for traditional business decisions to security risk. Register for the webinar.

More from CISO

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today